Vulnerability Management Jobs in the UK

26 to 50 of 150 Vulnerability Management Jobs in the UK

Head of Digital Operations

London (city), London, England
National Audit Office
of Digital Operations is a newly created role within the NAO's Digital Services (DS) function. Leading a newly created team bringing together; Service Management, technology & cloud operations, the management of all digital strategic support managed service providers, including service desk, 2nd-4th line support, End User & Infrastructure … Computing (EUIC), network & connectivity management and leading an internal technical operations team. The Head of Digital Operations is responsible for the operational effectiveness of all the NAO's digital estate. This includes ensuring the availability, accessibility, reliability, security and operational effectiveness of all NAO digital systems, services, and networks. … requires regular attendance to the office in Victoria, London, and occasional attendance in the NAO's office in Newcastle. Function Responsibilities - • To oversee the management, delivery and performance of all DS operations including support, maintenance, vulnerability management, service management, end user & infrastructure computing services, networking & all more »
Employment Type: Permanent
Salary: £80,000
Posted:

Threat and Vulnerability Manager

London Area, United Kingdom
Gresham Hunt
Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced Vulnerability Management professional for their London based team. This is an exciting opportunity to help drive the vulnerability management programme as … part of the global technology team. The successful candidate will have: 8 years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance … frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and other standards/frameworks relevant to application security and vulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell more »
Posted:

Vulnerability Engineer

London
LA International Computer Consultants Ltd
Vulnerability Management Internal : Operations (metrics, ID & triage/resolution initiation, patching, hardening, verification scans, maintenance, changes) Vulnerability Management External : Operations (metrics. ID & triage/resolution initiation. Track internet endpoints/DNS be this TSB or 3rd party hosted) One FTE as a hands-on engineer LA more »
Employment Type: Contract
Rate: £600 - £800
Posted:

Information Security Lead

Oxford, Oxfordshire, United Kingdom
Hybrid / WFH Options
Planet Recruitment
installation and configuration of hardware, applications, and software as part of Privacy by Design and Default. Manage and coordinate operational components of security incident management, including detection response and reporting. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans … and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best … in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more of the following areas: Unix/Linux Servers, Windows servers, firewalls, IDS/ more »
Employment Type: Permanent
Salary: £45000 - £59000/annum
Posted:

Lead Cyber Security Consultant- Contract - Hybrid -Reading

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Project People
reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's … Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design/decision templates … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices Must have expertise and experience in one or more of the following technical domains: Cloud/Hybrid security Infrastructure and more »
Employment Type: Contract
Posted:

Senior SOC Analyst

London Area, United Kingdom
Hybrid / WFH Options
CLS Group
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, Vulnerability Management, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Posted:

Senior Infrastructure Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Ripple Labs Inc
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the Vulnerability Management technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Employment Type: Technology
Posted:

Cloud Security Architect - CGEMJP00253852

Knutsford, Cheshire, North West, United Kingdom
Experis
of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors, regulatory requirements and changing … of controls and standards to both business and security solutions in order to maintain or increase the Bank's security posture. * Knowledge of risk management processes (e.g. methods for assessing and mitigating risk). * Skill in designing countermeasures to identified security risks. * Knowledge of cybersecurity and privacy principles and more »
Employment Type: Contract
Rate: £750 - £800 per day + Umbrella
Posted:

Senior Cyber Security Engineer

Teddington, London, United Kingdom
Matchtech
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as Vulnerability Management and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
Employment Type: Permanent
Salary: £50,000
Posted:

Head of Cyber Security

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
Posted:

Senior Security Engineer - Onsite - £100K

London Area, United Kingdom
Oliver Bernard
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerability management tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

SC cleared Lead/Tier 3 SOC Analyst

Birmingham, West Midlands
LA International Computer Consultants Ltd
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerability management tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Employment Type: Contract
Rate: £500 - £550
Posted:

Technology Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Gen+
strong technical skills and a great customer service approach. You will have a good understanding of platform operations, integrations and surrounding technology (preferably Learning Management Systems), knowledge around cloud hosting and be able to use SQL to create custom reports. What you will be doing LMS/Platform Administration … monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team – utilising PowerBI Build light … team around Educational technology, LMS/Platform functionality, accessibility and general technology Prepare reports for CEO, COO and wider Gen+ team IT and Security management Maintain the platform DPIA/Risk Assessment process – feeding into the Risk Register DNS record and certificate management relating to platform Manage GitHub more »
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

Global IT Infrastructure Manager

London, England, United Kingdom
Hybrid / WFH Options
ITRS
with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support … available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and … infrastructure services delivered. Directly contribute to ITRS Group's goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for more »
Posted:

Information Technology Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Intaso
and maintaining the integrity, confidentiality, and availability of our information systems. Your expertise in Microsoft technologies and experience with SIEM (Security Information and Event Management) tools will be instrumental in identifying and mitigating security threats proactively. Responsibilities: 1. Security Monitoring and Incident Response: - Utilize SIEM tools such as Microsoft … analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Proactive Appointments Limited
someone with previous experience in a Cyber Security Engineer role where they have gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application … in complex cross-technology environments. Maintain accurate logs of security events and incidents. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards. Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure. Understanding of security operations and keen to learn. Strong communication skills and able to work collaboratively with IT and other stakeholders. more »
Employment Type: Permanent, Work From Home
Salary: £60,000
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Focus Resourcing Limited
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Excellent communication skills and able to work collaboratively with IT and other stakeholders more »
Posted:

Senior Cyber Security Engineer

Reading, Berkshire, South East, United Kingdom
Focus Resourcing Group
in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners … to recover service in complex cross-technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security … understanding of Security Infrastructure design, IT Security best practice and hardening standards Strong understanding of common IT protocols, infrastructure and systems e.g. Networks, Domain management and virtualised infrastructure Understanding of security operations and keen to learn Strong communication skills and able to work collaboratively with IT and other stakeholders more »
Employment Type: Permanent
Posted:

IT Security Manager - Security Operations - Birmingham

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £50951/annum
Posted:

Lead IT Security Manager

Birmingham, West Midlands, West Midlands (County), United Kingdom
Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Employment Type: Permanent
Salary: £50950 - £56000/annum
Posted:
Vulnerability Management
10th Percentile
£39,900
25th Percentile
£50,000
Median
£65,000
75th Percentile
£84,375
90th Percentile
£97,500